Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Thu, 6 Jun 2013 02:42:10 +0800
From: 唐鳳 <audreyt@...reyt.org>
To: Russ Allbery <rra@...nford.edu>
Cc: oss-security@...ts.openwall.com
Subject: Re: CVE-2013-2145: perl Module::Signature code execution vulnerability

Russ Allbery <rra@...nford.edu> 於 2013/6/6 上午2:24 寫道:
> Speaking as a CPAN author, the second would be awesome.  For bonus points,
> once one registers a key with CPAN, CPAN could then even check one's
> uploads and disallow uploads that aren't signed with the proper key.

Indeed. Note the main design & work for the module was done ~10 years ago, so my recollection is a bit fuzzy, but the module was designed such that it allows this invocation against a hypothetical CPAN OpenPGP server:

    env MODULE_SIGNATURE_KEYSERVER=pgp.cpan.org cpansign verify

At that time PAUSE (the CPAN upload server) was not yet made public, and there were insufficient rounds of tuits to implement this feature as part of my TPF 2003 grant .

Now that the PAUSE codebase has been released on GitHub since 2010, one can imagine adding a PGP import functionality into it. That'd be _awesome_.

Cheers,
Audrey

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.